Prosecution Insights
Last updated: April 19, 2026
Application No. 18/693,652

CUSTOMER PREMISES NETWORK ACCESS CONTROL

Final Rejection §103
Filed
Mar 20, 2024
Examiner
AMBAYE, SAMUEL
Art Unit
2433
Tech Center
2400 — Computer Networks
Assignee
InterDigital Patent Holdings, Inc.
OA Round
2 (Final)
82%
Grant Probability
Favorable
3-4
OA Rounds
3y 0m
To Grant
99%
With Interview

Examiner Intelligence

Grants 82% — above average
82%
Career Allow Rate
550 granted / 670 resolved
+24.1% vs TC avg
Strong +25% interview lift
Without
With
+25.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 0m
Avg Prosecution
28 currently pending
Career history
698
Total Applications
across all art units

Statute-Specific Performance

§101
7.2%
-32.8% vs TC avg
§103
71.7%
+31.7% vs TC avg
§102
6.4%
-33.6% vs TC avg
§112
4.6%
-35.4% vs TC avg
Black line = Tech Center average estimate • Based on career data from 670 resolved cases

Office Action

§103
DETAILED ACTION Notice of Pre-AIA or AIA Status 1. This action is responsive to communication filed on 26 November 2025, with acknowledgement of an original application filed on 20 March 2024. Status of Claims 2. Claims 21-40 are pending. Claims 21 and 31 are in independent forms. Claims 21and 31 has been amended. Claims 1-20 has been cancelled. Drawings 3. The drawings filed on 11/18/2023 are accepted by the examiner. Response to Amendment 4. Applicant’s arguments filed 20 March 2024 have been fully considered however they are moot due to new grounds of rejection below initiated by applicant’s amendment. Claim Rejections - 35 USC § 103 6. The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. 7. Claims 21-23, 25, 27-33, 35 and 37-40 are rejected under 35 U.S.C. 103 as being unpatentable over Shan et al. US Patent Application Publication No. 2019/0342851 (hereinafter Shan) in view of Adjakple et al. US Patent Application Publication No. 2017/0257886 (hereinafter Adjakple) in further view of Wang et al. US Patent Application Publication No. 2015/0289138 (hereinafter Wang). Regarding claim 21, Shan discloses a base station device (Fig. 5, element 500) comprising: a processor (Fig. 7, processors 710) and memory (Fig. 7, memory/storage devices 720), the processor and memory configured to: “receive a registration request from a wireless transmit/receive unit (WTRU), the registration request comprising an indication that the WTRU is requesting access to a private network” (see Shan Fig. 11, par. 0250, Process 1100 begins at operation 1105 where the RF circuitry (e.g., RFEM 515) of the RAN node 111 receives a registration request message from the UE 101, where the registration request message includes either the LADN DNN(s) configured for the UE 101 or an indication of requesting LADN information); “receive an identifier of the WTRU from the network node” (see Shan par. 0050, The UE 301 needs to register with the AMF 321 in order to receive network services that require registration. Registration Management (RM) is used to register or deregister the UE 301 with the network (e.g., AMF 321), and establish a UE context in the network (e.g., AMF 321). An initial registration procedure involves execution of network access control functions (e.g., user authentication and access authorization based on subscription profiles in UDM 327). As result of the registration procedure, the identifier of the serving AMF 321 serving the UE 301 in the access through which the UE 301 has registered will be registered in UDM 327); and “forward a registration accept message to the WTRU” (see Shan par. 0136, The AMF 321 sends a Registration Accept message to the UE 301 indicating that the Registration Request has been accepted); Shan does not explicitly discloses send the registration request to a network node, wherein an indication of an identifier of the private network and an indication of an authorization request for the WTRU to access the private network is sent with the registration request to the network node, wherein the registration request comprises an indication of an identifier of the WTRU. However, in analogues art, Adjakple discloses send the registration request to a network node, wherein an indication of an identifier of the private network and an indication of an authorization request for the WTRU to access the private network is sent with the registration request to the network node, wherein the registration request comprises an indication of an identifier of the WTRU (see Adjakple pars. 0367-0370, The WTRU may include in its network registration (e.g., ATTACH REQUEST or a VN communication primitive which may be forwarded to the VN) one or more of its VN Extension Enabling Indicator, a VN Extension WTRU Privilege Code, a VN-ID, VN-UD-Id, the requested service category (and may be the urgency level), the identities of the radio access network or the PLMN that is under request to be included in the VN, or the address or routing path for the request (part of the ATTACH REQUEST) to be forwarded to the VN network and connection management node. The WTRU may indicate the network registration message be sent to a specific network entity advertised by the VN or the network registration to the CN's controlling node. From the visited network, the base-station (eNB or NodeB) may accommodate the visiting WTRU when it receives one or more of the VN Extension Enabling Indicator, the VN Extension WTRU Privilege Code, the VN-Id, or the VN-UD-Id). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Adjakple into the system of Shan to include a setup or configuration of the general-VN-support Cell/RAN or local network and the WTRU registration message indicator, the Cell/RAN or the local network may handle the registration, forward the message to the chosen VN and let the WTRU and the VN communicate directly (see Adjakple par. 0328). Shan in view of Adjakple does not explicitly discloses determine whether the WTRU is authorized to access the private network based on the received identifier of the WTRU and a list of allowed device identifiers for the private network; send authorization information and an indication that the WTRU has been authorized to access the private network to the network node. However, in analogues art, Wang discloses determine whether the WTRU is authorized to access the private network based on the received identifier of the WTRU and a list of allowed device identifiers for the private network (see Wang par. 0019, The methods may further provide that the FAP receives a response to the request message generated by the AAA in response to determining that the FAP identifier is valid for the FAP. This response may comprise a FAP type identifier and an access control list for the FAP. In these methods, the FAP may control access by mobile stations to the FAP, using the FAP type identifier and the access control list); send authorization information and an indication that the WTRU has been authorized to access the private network to the network node (see Wang par. 0021, the methods may further comprise that the AAA transmits a response to the request message in response to determining that the FAP identifier is valid for the FAP, the response comprising the message authenticator and an access control list for the FAP. The SeGW may forward the response from the AAA to the FAP, in response to determining that the message authenticator is valid. The FAP may control access by mobile stations to the FAP, using the access control list from the response). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Wang into the system of Shan and Adjakple to include an access control list may comprise identifiers for authorized mobile stations. The authorization data may further include a FAP type identifier (see Wang par. 0013). Regarding claims 22 and 32, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan further discloses wherein the private network is a customer premise network (CPN) (see Shan par. 0084, he LADN may be an enterprise network where the UE 301 may only access enterprise network resources when the UE 301 is at the enterprise premises, within a predetermined distance of the enterprise premises, within a specified geofence, and/or the like). Regarding claims 23 and 33, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan further discloses wherein the identifier is a generic public subscription identifier (GPSI) (see Shan par. 0082, Mobility GPSI List of the GPSI (Generic Public Subscription Subscription data (data Identifier) used both inside and outside of the needed for UE Registration 3GPP system to address a 3GPP subscription). Regarding claims 25 and 35, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Wang further discloses wherein the processor and memory are configured to receive the information associated with the private network, the information comprising the list of allowed device identifiers (see Wang par. 0019, The methods may further provide that the FAP receives a response to the request message generated by the AAA in response to determining that the FAP identifier is valid for the FAP. This response may comprise a FAP type identifier and an access control list for the FAP. In these methods, the FAP may control access by mobile stations to the FAP, using the FAP type identifier and the access control list). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Wang into the system of Shan and Adjakple to include an access control list may comprise identifiers for authorized mobile stations. The authorization data may further include a FAP type identifier (see Wang par. 0013). Regarding claims 27 and 37, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan further discloses wherein the network node comprises an access and mobility management function (AMF) (see Shan Fig. 3, AMF 321, par. 0047-0048, The AMF 321 is responsible for registration management (e.g., for registering UE 301, etc.), connection management, reachability management, mobility management, and lawful interception of AMF-related events, and access authentication and authorization). Regarding claims 28 and 38, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan further discloses wherein the private network is not a public land mobile network (PLMN) (see Shan par. 0051, perform a Deregistration procedure and enter RM-DEREGISTERED state when the UE 301 needs to be no longer registered with the PLMN (wherein the UE 301 may decide to deregister from the network at any time; enter the RM-DEREGISTERED state when receiving a Registration Reject message or a Deregistration message (the actions of the UE 301 depend upon a ‘cause value’ in the Registration Reject or Deregistration message); among others). Regarding claim 29 and 39, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Wang further discloses wherein the processor and memory are configured to: receive an indication of a device type of the WTRU from the network node (see Wang par. 0186, At 902, an enforcement point may request authorization data from a storage point, by transmitting FAP authentication data to a remote storage point. At 904, the enforcement point receives the authorization data, which may comprise an access control list (ACL) and FAP type identifier as described above, in response to the authentication data. At 906, the enforcement point controls access to services by a mobile station via the FAP, in response to the authorization data received from the storage point. More particularly, at 908 the enforcement point controls access in response to a designated FAP type and the ACL, which comprises an identifier for at least one mobile station authorized to access services via the FAP); and determine whether the WTRU is authorized to access the private network based on the device type of the WTRU (see Wang par. 0186, In response to determining that the FAP type is “open association,” the enforcement point permits access by all mobile stations and there is no use of the ACL by the FAP). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Wang into the system of Shan and Adjakple to include an access control list may comprise identifiers for authorized mobile stations. The authorization data may further include a FAP type identifier (see Wang par. 0013). Regarding claims 30 and 40, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan further discloses wherein the processor and memory are configured to: receive an authorization credential from the network node before receiving the registration request from the WTRU (see Shan par. 0080, The UDM 327 may include a UDM-FE, which is in charge of processing credentials, location management, subscription management and so on. Several different front ends may serve the same user in different transactions. The UDM-FE accesses subscription information stored in the UDR and performs authentication credential processing, user identification handling, access authorization, registration/mobility management, and subscription management), Regarding claim 31, Shan discloses a method performed by a base station device, the method comprising: “receiving a registration request from a wireless transmit/receive unit (WTRU), the registration request comprising an indication that the WTRU is requesting access to a private network” (see Shan Fig. 11, par. 0250, Process 1100 begins at operation 1105 where the RF circuitry (e.g., RFEM 515) of the RAN node 111 receives a registration request message from the UE 101, where the registration request message includes either the LADN DNN(s) configured for the UE 101 or an indication of requesting LADN information); “receiving an identifier of the WTRU from the network node” (see Shan par. 0050, The UE 301 needs to register with the AMF 321 in order to receive network services that require registration. Registration Management (RM) is used to register or deregister the UE 301 with the network (e.g., AMF 321), and establish a UE context in the network (e.g., AMF 321). An initial registration procedure involves execution of network access control functions (e.g., user authentication and access authorization based on subscription profiles in UDM 327). As result of the registration procedure, the identifier of the serving AMF 321 serving the UE 301 in the access through which the UE 301 has registered will be registered in UDM 327); and “forwarding a registration accept message to the WTRU” (see Shan par. 0136, The AMF 321 sends a Registration Accept message to the UE 301 indicating that the Registration Request has been accepted); Shan does not explicitly discloses sending the registration request to a network node, wherein an indication of an identifier of the private network and an indication of an authorization request for the WTRU to access the private network is sent with the registration request to the network node, wherein the registration request comprises an indication of an identifier of the WTRU. However, in analogues art, Adjakple discloses sending the registration request to a network node, wherein an indication of an identifier of the private network and an indication of an authorization request for the WTRU to access the private network is sent with the registration request to the network node, wherein the registration request comprises an indication of an identifier of the WTRU (see Adjakple pars. 0367-0370, The WTRU may include in its network registration (e.g., ATTACH REQUEST or a VN communication primitive which may be forwarded to the VN) one or more of its VN Extension Enabling Indicator, a VN Extension WTRU Privilege Code, a VN-ID, VN-UD-Id, the requested service category (and may be the urgency level), the identities of the radio access network or the PLMN that is under request to be included in the VN, or the address or routing path for the request (part of the ATTACH REQUEST) to be forwarded to the VN network and connection management node. The WTRU may indicate the network registration message be sent to a specific network entity advertised by the VN or the network registration to the CN's controlling node. From the visited network, the base-station (eNB or NodeB) may accommodate the visiting WTRU when it receives one or more of the VN Extension Enabling Indicator, the VN Extension WTRU Privilege Code, the VN-Id, or the VN-UD-Id). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Adjakple into the system of Shan to include a setup or configuration of the general-VN-support Cell/RAN or local network and the WTRU registration message indicator, the Cell/RAN or the local network may handle the registration, forward the message to the chosen VN and let the WTRU and the VN communicate directly (see Adjakple par. 0328). Shan in view of Adjakple does not explicitly discloses determining whether the WTRU is authorized to access the private network based on the received identifier of the WTRU and a list of allowed device identifiers for the private network; sending authorization information and an indication that the WTRU has been authorized to access the private network to the network node. However, in analogues art, Wang discloses determining whether the WTRU is authorized to access the private network based on the received identifier of the WTRU and a list of allowed device identifiers for the private network (see Wang par. 0019, The methods may further provide that the FAP receives a response to the request message generated by the AAA in response to determining that the FAP identifier is valid for the FAP. This response may comprise a FAP type identifier and an access control list for the FAP. In these methods, the FAP may control access by mobile stations to the FAP, using the FAP type identifier and the access control list); sending authorization information and an indication that the WTRU has been authorized to access the private network to the network node (see Wang par. 0021, the methods may further comprise that the AAA transmits a response to the request message in response to determining that the FAP identifier is valid for the FAP, the response comprising the message authenticator and an access control list for the FAP. The SeGW may forward the response from the AAA to the FAP, in response to determining that the message authenticator is valid. The FAP may control access by mobile stations to the FAP, using the access control list from the response). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Wang into the system of Shan and Adjakple to include an access control list may comprise identifiers for authorized mobile stations. The authorization data may further include a FAP type identifier (see Wang par. 0013). 8. Claims 24, 26, 34, and 36 are rejected under 35 U.S.C. 103 as being unpatentable over Shan et al. US Patent Application Publication No. 2019/0342851 (hereinafter Shan) in view of Adjakple et al. US Patent Application Publication No. 2017/0257886 (hereinafter Adjakple) in further view of Wang et al. US Patent Application Publication No. 2015/0289138 (hereinafter Wang) in further view of Liao WO 2022/192638 (hereinafter Liao). Regarding claims 24 and 34, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan in view of Adjakple in further view of Wang does not explicitly discloses wherein the authorization information comprises authorization information for the WTRU, the authorization information indicating one or more of an allowed CPN data name network (DNN) list, an allowed premises radio access station (PRAS) list, or an authorization expiry time. However, in analogues art, Liao discloses wherein the authorization information comprises authorization information for the WTRU, the authorization information indicating one or more of an allowed CPN data name network (DNN) list, an allowed premises radio access station (PRAS) list, or an authorization expiry time (see Liao pars. 0122, 0265-0267, FIG. 7 illustrates diagram 700 of a customer premises network (CPN) using a premises radio access station (PRAS) configured for communication with a 5G network, in accordance with some aspects, the 5G network sends a registration accept message to PRAS via eRG in response to the registration request message sent in Step 2; the registration accept message contains an optional activation code for RPP. In addition, the 5G network may indicate to eRG to establish required PDU session information for preparing PRAS’s remote provisioning process, e.g. DNN, S- NSSAI). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Liao into the system of Shan, Adjakple, and Wang to include a 5G system support for identification, authentication, and authorization of (off-the-shelf) Premises Radio Access Stations (see Liao par. 00151). Regarding claims 26 and 36, Shan in view of Adjakple in further view of Wang discloses the base station device of claim 21, the method of claim 31, Shan in view of Adjakple in further view of Wang does not explicitly discloses wherein the base station device comprises a premises radio access station (PRAS). However, in analogues art, Liao discloses wherein the base station device comprises a premises radio access station (PRAS) (see Liao par. 0125, the use of indoor small base stations in 5G residential use cases and determine the applicability for use with indoor small base stations in 5G residential use cases of concepts like private slices, SNPN, CAG as specified for non-public networks. The indoor small base station can be replaced with Premises Radio Access Station (PRAS) for supporting new service requirements). Therefore it would have been obvious to a person of ordinary skill in the art before the effective filing date of the application to incorporate the teachings of Liao into the system of Shan, Adjakple, and Wang to include an indoor small base station replaced with a premises radio access station for supporting new service requirements (see Liao par. 00125). Conclusion Applicant's amendment necessitated the new ground(s) of rejection presented in this Office action. Accordingly, THIS ACTION IS MADE FINAL. See MPEP § 706.07(a). Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to SAMUEL AMBAYE whose telephone number is (571)270-7635. The examiner can normally be reached M-F 9:00 AM - 6:00 PM. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeffrey Pwu can be reached at (571) 272-6798. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /SAMUEL AMBAYE/Examiner, Art Unit 2433 /JEFFREY C PWU/Supervisory Patent Examiner, Art Unit 2433
Read full office action

Prosecution Timeline

Mar 20, 2024
Application Filed
Aug 23, 2025
Non-Final Rejection — §103
Nov 26, 2025
Response Filed
Feb 25, 2026
Final Rejection — §103 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12603912
AUTOMATED SECURITY TESTING SYSTEM AND METHOD
2y 5m to grant Granted Apr 14, 2026
Patent 12596834
METHOD OF PROCESSING DATA FOR PERSONAL INFORMATION PROTECTION AND APPARATUS USING THE SAME
2y 5m to grant Granted Apr 07, 2026
Patent 12598057
SIMILARITY CALCULATION SYSTEM, SIMILARITY CALCULATION APPARATUS, SIMILARITY CALCULATION METHOD, AND SIMILARITY CALCULATION PROGRAM
2y 5m to grant Granted Apr 07, 2026
Patent 12593203
Remote identity verification and dynamic storage of identity data
2y 5m to grant Granted Mar 31, 2026
Patent 12574363
SYSTEM FOR USER-INITIATED AUTHENTICATION OF AN ELECTRONIC COMMUNICATION CHANNEL USING A SECURE COMPUTING APPLICATION TOKEN
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
82%
Grant Probability
99%
With Interview (+25.1%)
3y 0m
Median Time to Grant
Moderate
PTA Risk
Based on 670 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month